X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (5274) 5274
Conference Proceeding (2336) 2336
Book Chapter (378) 378
Publication (350) 350
Dissertation (214) 214
Newspaper Article (186) 186
Magazine Article (77) 77
Book Review (39) 39
Book / eBook (29) 29
Trade Publication Article (24) 24
Government Document (22) 22
Web Resource (16) 16
Paper (9) 9
Report (9) 9
Reference (4) 4
Data Set (2) 2
Newsletter (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
anonymity (5890) 5890
privacy (2353) 2353
k-anonymity (1034) 1034
computer science, information systems (956) 956
security (924) 924
authentication (802) 802
computer science (609) 609
telecommunications (597) 597
analysis (578) 578
internet (575) 575
engineering, electrical & electronic (551) 551
cryptography (487) 487
data privacy (403) 403
computer science, theory & methods (372) 372
protocols (372) 372
algorithms (350) 350
studies (325) 325
humans (306) 306
protocol (285) 285
social networks (283) 283
index medicus (281) 281
location privacy (280) 280
servers (277) 277
communication (264) 264
networks (259) 259
user anonymity (251) 251
computer science, software engineering (250) 250
computer communication networks (239) 239
encryption (239) 239
confidentiality (237) 237
computer science, artificial intelligence (231) 231
computer science, hardware & architecture (231) 231
economics (202) 202
research (196) 196
data security (195) 195
ethics (193) 193
management (192) 192
methods (192) 192
data mining (189) 189
smart cards (186) 186
english literature (179) 179
identity (179) 179
behavior (178) 178
computer security (178) 178
scheme (178) 178
protection (173) 173
usage (171) 171
public key (167) 167
匿名性 (166) 166
computer-mediated communication (165) 165
smart card (165) 165
wireless sensor networks (161) 161
efficient (160) 160
privacy protection (160) 160
wireless networks (159) 159
computer information security (156) 156
databases (156) 156
location-based services (156) 156
routing (156) 156
information (151) 151
geheimhaltung (150) 150
anonymization (146) 146
authentifizierung (141) 141
mutual authentication (141) 141
female (140) 140
mathematical models (140) 140
key agreement (139) 139
mobile communication (139) 139
data encryption (137) 137
model (137) 137
privacy preservation (137) 137
cloud computing (134) 134
technology (134) 134
male (133) 133
trust (132) 132
cryptanalysis (131) 131
access control (128) 128
disclosure (128) 128
tor (127) 127
sensors (126) 126
network security (125) 125
secure (124) 124
engineering (121) 121
publishing (120) 120
authorship (119) 119
computer science, interdisciplinary applications (112) 112
fairness (111) 111
l-diversity (111) 111
conferences (109) 109
information systems (109) 109
psychology, multidisciplinary (107) 107
computer networks (106) 106
artificial intelligence (105) 105
computer simulation (105) 105
verschlüsselung (104) 104
games (103) 103
clustering (102) 102
information security (102) 102
information science & library science (100) 100
medical informatics (99) 99
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (5) 5
Robarts - Stacks (3) 3
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Faculty of Information - Stacks (1) 1
OISE - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (7594) 7594
Japanese (143) 143
French (133) 133
Chinese (117) 117
Korean (84) 84
German (63) 63
Spanish (50) 50
Portuguese (14) 14
Czech (8) 8
Croatian (6) 6
Italian (6) 6
Russian (5) 5
Swedish (5) 5
Hungarian (4) 4
Catalan (3) 3
Polish (3) 3
Turkish (3) 3
Dutch (2) 2
Hebrew (2) 2
Persian (2) 2
Arabic (1) 1
Danish (1) 1
Estonian (1) 1
Indonesian (1) 1
Lithuanian (1) 1
Romanian (1) 1
Slovenian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Teknokultura, ISSN 1549-2230, 2014, Volume 11, Issue 2, pp. 441 - 452
Journal Article
Economics Letters, ISSN 0165-1765, 11/2018, Volume 172, p. 19
We show that reinforcement and top–bottom cancellation imply anonymity, and that the basic best–worst rule can be characterised by neutrality, continuity,... 
Anonymity | Neutrality
Journal Article
Proceedings of the 2014 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 11/2014, pp. 15 - 29
Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities... 
anonymity | tor | bitcoin | p2p | Anonymity | Tor | Bitcoin | P2P
Conference Proceeding
Computer Communications, ISSN 0140-3664, 2010, Volume 33, Issue 4, pp. 420 - 431
Anonymous communications aim to preserve communications privacy within the shared public network environment. It can provide security well beyond content... 
Recipient anonymity | Communication anonymity | Sender anonymity | Source anonymous message authentication | Relationship anonymity | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | MIX | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 337 - 348
We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the... 
onion routing | anonymity | metrics
Conference Proceeding
European Journal of Information Systems, ISSN 0960-085X, 05/2013, Volume 22, Issue 3, pp. 295 - 316
Journal Article
ACM Transactions on Knowledge Discovery from Data (TKDD), ISSN 1556-4681, 03/2007, Volume 1, Issue 1, pp. 3 - es
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a new definition of privacy... 
Data privacy | diversity | k -anonymity | privacy-preserving data publishing | ℓ-diversity | Privacy-preserving data publishing | k-anonymity
Journal Article
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 03/2017, Volume 29, Issue 6, pp. np - n/a
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 06/2010, Volume 42, Issue 4, pp. 1 - 53
Journal Article
Information Sciences, ISSN 0020-0255, 12/2015, Volume 324, pp. 32 - 43
•We propose a new notion of anonymity, called set-theoretic conditional anonymity.•We compare the hierarchy of strong anonymity and the hierarchy of... 
Anonymity | Conditional anonymity | Strong anonymity | Non-probabilistic adversary | Anonymity metric | PRIVACY | INFORMATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | Probability theory | Probabilistic methods | Preserves
Journal Article
Proceedings of the 2008 ACM SIGMOD international conference on management of data, ISSN 0730-8078, 06/2008, pp. 93 - 106
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply... 
dynamic programming | anonymity | degree sequence | Anonymity | Degree sequence | Dynamic programming
Conference Proceeding
Economics Letters, ISSN 0165-1765, 07/2018, Volume 168, p. 110
We axiomatize the anti-plurality rule by anonymity, neutrality, reinforcement, and new axioms, that is, averseness and bottoms-only. Averseness is a weaker... 
Studies | Anonymity | Neutrality
Journal Article
ACM SIGMETRICS Performance Evaluation Review, ISSN 0163-5999, 01/2019, Volume 46, Issue 1, pp. 5 - 7
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 05/2017, Volume 70, pp. 48 - 58
The fusion of mobile devices and social networks is stimulating a wider use of Location Based Service (LBS) and makes it become an important part in our daily... 
Location privacy | [formula omitted]-anonymity | Privacy preserving | Location based service (LBS) | Information entropy | k-anonymity | COMPUTER SCIENCE, THEORY & METHODS | ACHIEVING K-ANONYMITY | Privacy | Mobile devices | Analysis | Usage | Algorithms
Journal Article
Journal of Law and Economics, ISSN 0022-2186, 05/2017, Volume 60, Issue 2, p. 361
It has been long recognized that cash plays a critical role in fueling street crime because of its liquidity and transactional anonymity. In this paper, we... 
Crime | Liquidity | Anonymity | Cash
Journal Article
Industrial and Organizational Psychology, ISSN 1754-9426, 06/2015, Volume 8, Issue 2, pp. 171 - 179
We are in almost full agreement with Landers and Behrend's (2015) thoughtful and balanced critiques of various convenience sampling strategies focusing on the... 
QUESTIONS | ANONYMITY | PSYCHOLOGY, APPLIED
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 09/2018, Volume 86, pp. 881 - 892
With the increasing popularity of location-based services (LBSs), there is a corresponding increase in the potential for location privacy leakage. Existing... 
Uniform grid | Location privacy | [formula omitted]-anonymity | Caching | Order-preserving symmetric encryption (OPSE) | k-anonymity | ATTACKS | SECURITY ANALYSIS | COMPUTER SCIENCE, THEORY & METHODS | USERS | Privacy | Information science | Analysis
Journal Article
Proceedings of the 2008 ACM SIGMOD international conference on management of data, ISSN 0730-8078, 06/2008, pp. 121 - 132
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services ( LBS ). To protect privacy,... 
private information retrieval | query privacy | location anonymity | Private information retrieval | Location anonymity | Query privacy
Conference Proceeding
Future Generation Computer Systems, ISSN 0167-739X, 09/2017, Volume 74, pp. 375 - 384
The developments in positioning and mobile communication technology have made the location-based service (LBS) applications more and more popular. For privacy... 
Location-label | K-anonymity | Location-based service (LBS) | Location privacy | Sensitive location | FRAMEWORK | COMPUTER SCIENCE, THEORY & METHODS | ACHIEVING K-ANONYMITY | Privacy | Algorithms
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.